Listen Now

Follow me on Twitter

In October last year I was awarded the first $100,000 bounty for a Mitigation Bypass in Microsoft Windows. My original plan was to not discuss it in any depth until Microsoft had come up with a sufficient changes to reduce the impact of the bypass. However as other researchers have basically come up with variants of the same technique, some of which are publically disclosed with proof-of-concept code it seemed silly to not discuss my winning entry. So what follows is some technical detail about the bypass itself. I am not usually known for finding memory corruption vulnerabilities, mainly because I donâ€™t go looking for them. Still I know my way around and so I knew the challenges I would face trying to come …

Archives

Categories

Subscribe To Paul's Newsletter

Don't miss the latest from The Edge of Innovation. Paul's weekly newsletter will bring you his favorite articles from the week and that week's podcast. Chock full of the latest in technology and business developments, Paul is sure to help you hack the future of your business. Subscribe here to receive Paul's weekly newsletter from The Edge of Innovation.